• Non ci sono risultati.

Higher Hamming weights for locally recoverable codes on algebraic curves

N/A
N/A
Protected

Academic year: 2021

Condividi "Higher Hamming weights for locally recoverable codes on algebraic curves"

Copied!
13
0
0

Testo completo

(1)

22 July 2021

AperTO - Archivio Istituzionale Open Access dell'Università di Torino

Original Citation:

Higher Hamming weights for locally recoverable codes on algebraic curves

Published version:

DOI:10.1016/j.ffa.2016.03.004 Terms of use:

Open Access

(Article begins on next page)

Anyone can freely access the full text of works made available as "Open Access". Works made available under a Creative Commons license can be used according to the terms and conditions of said license. Use of all other works requires consent of the right holder (author or publisher) if not exempted from copyright protection by the applicable law. Availability:

This is the author's manuscript

(2)

H I G H E R H A M M I N G W E I G H T S F O R

L O C A L L Y R E C O V E R A B L E C O D E S

O N A L G E B R A I C C U R V E S

Edoardo Ballico

& Chiara Marcolla

1

abstract

We study locally recoverable codes on algebraic curves. In the first part of the manuscript, we provide a bound on the generalized Hamming weight of these codes. In the second part, we propose a new family of algebraic geometric LRC codes, which are LRC codes from the Norm-Trace curve. Finally, using some properties of Hermitian codes, we improve the bounds on the distance proposed in [1] of some Hermitian LRC codes.

1

introduction

The v-th generalized Hamming weight dv(C) of a linear code C is the minimum

sup-port size of v-dimensional subcodes of C. The sequence d1(C), . . . , dk(C)of generalized

Hamming weights was introduced by Wei [37] to characterize the performance of a

lin-ear code on the wire-tap channel of type II. Later, the GHWs of linlin-ear codes have been used in many other applications regarding the communications, as for bounding the covering radius of linear codes [15], in network coding [26], in the context of list

decod-ing [7, 9], and finally for secure secret sharing [18]. Moreover, in [2] the authors show

in which way an arbitrary linear code gives rise to a secret sharing scheme, in [16, 17]

the connection between the trellis or state complexity of a code and its GHWs is found and in [4] the author proves the equivalence to the dimension/length profile of a code

and its generalized Hamming weight. For these reasons, the GHWs (and their extended version, the relative generalized Hamming weights [21,19]) play a central role in coding

theory. In particular, generalized and relative generalized Hamming weights are studied for Reed-Muller codes [10,23] and for codes constructed by using an algebraic curve [6] ∗ The first author is partially supported by MIUR and GNSAGA of INDAM (Italy).

* Department of Mathematics, University of Trento, Italy. Email address: ballico@science.unitn.it 1

Department of Mathematics, University of Turin, Italy. Email address: chiara.marcolla@unito.it

(3)

preliminary notions 2

as Goppa codes [24,38], Hermitian codes [12,25] and Castle codes [27].

In this paper, we provide a bound on the generalized Hamming weight of locally re-coverable codes on the algebraic curves proposed in [1]. Moreover, we introduce a new

family of algebraic geometric LRC codes and improve the bounds on the distance for some Hermitian LRC codes.

Locally recoverable codes were introduced in [8] and they have been significantly

studied because of their applications in distributed and cloud storage systems [3,13,32, 34,35]. We recall that a code C ∈ (Fq)n has locality r if every symbol of a codeword c

can be recovered from a subset of r other symbols of c.

In other words, we consider a finite field K = Fq, where q is a power of a prime, and

an [n, k] code C over the field K, where k = logq(|C|). For each i ∈ {1, . . . , n} and each

a∈ K set C(i, a) ={c ∈ C | ci = a}. For each I ⊆ {1, . . . , n} and each S ⊆ C let SI be the

restriction of S to the coordinates in I.

Definition 1. Let C be an [n, k] code over the field K, where k = logq(|C|). Then C is

said to have all-symbol locality r if for each a ∈ Fq and each i ∈ {1, . . . , n} there is

Ii⊂{1, . . . , n} \ {i} with |Ii| 6 r, such that for CIi(i, a) ∩ CIi(i, a

0) =∅ for all a 6= a0. We

use the notation (n, k, r) to refer to the parameters of this code.

Note that if we receive a codeword c correct except for an erasure at i, we can recover the codeword by looking at its coordinates in Ii. For this reason, Iiis called a recovering

set for the symbol ci.

Let C be an (n, k, r) code, then the distance of this code has to verify the bound proved in [28,8] that is d 6 n − k − dk/re + 2. The codes that achieve this bound with equality

are called optimal LRC codes [32,34,35]. Note that when r = k, we obtain the Singleton

bound, therefore optimal LRC codes with r = k are MDS codes.

layout of the paper This paper is divided as follows. In Section 2 we recall the

notions of algebraic geometric codes and the definition of algebraic geometric locally recoverable codes introduced in [1]. In Section3we provide a bound on the generalized

Hamming weights of the latter codes. In Section4we propose a new family of algebraic

geometric LRC codes, which are LRC codes from the Norm–Trace curve. Finally, in Section5 we improve the bounds on the distance proposed in [1] for some Hermitian

LRC codes, using some properties of the Hermitian codes.

2

preliminary notions

2.1 Algebraic geometric codes

Let K =Fqbe a finite field, where q is a power of a prime. LetX be a smooth projective

(4)

func-preliminary notions 3

tions field onX. Let D be a divisor on the curve X. We recall that the Riemann-Roch space associated to D is a vector spaceL(D) over K defined as

L(D) = {f ∈ K(X) | (f) + D > 0} ∪ {0}. where we denote by (f) the divisor of f.

Assume that P1, . . . , Pn are rational points on X and D is a divisor such that D =

P1+ . . . + Pn. Let G be some other divisor such that supp(D) ∩ supp(G) = ∅. Then we

can define the algebraic geometric code as follows:

Definition 2. The algebraic geometric code (or AG code) C(D, G) associated with the divisors D and G is defined as

C(D, G) ={(f(P1), . . . , f(Pn))| f ∈ L(G)} ⊂ Kn.

The dual C⊥(D, G) of C(D, G) is an algebraic geometric code.

In other words an algebraic geometric code is the image of the evaluation map Im(evD) =

C(D, G), where the evaluation map evD:L(G) → Knis given by

evD(f) = (f(P1), . . . , f(Pn))∈ Kn.

Note that if D = P1+ . . . + Pn and we denote byP = {P1, . . . , Pn} we can also indicate

evDas evP.

2.2 Algebraic geometric locally recoverable codes

In this section we consider the construction of algebraic geometric locally recoverable codes of [1].

LetX and Y be smooth projective absolutely irreducible curves over K. Let g : X → Y be a rational separable map of curves of degree r + 1. Since g is separable, then there exists a function x ∈ K(X) such that K(X) = K(Y)(x) and that x satisfies the equation xr+1+ brxr+ . . . + b0 = 0, where bi∈ K(Y). The function x can be considered as a map

x :X → PK. Let h = deg(x) be the degree of x.

We consider a subset S = {P1, . . . , Ps} ⊂ Y(K) of Fq-rational points of Y, a divisor Q∞

such that supp(Q)∩ supp(S) = ∅ and a positive divisor D = tQ∞. We denote by

A = g−1(S) ={P

ij, where i = 0, . . . , r, j = 1, . . . , s} ⊂ X(K),

where g(Pij) = Pi for all i, j and assume that bi are functions in L(niQ∞) for some

natural numbers niwith i = 1, . . . , r.

Let{f1, . . . , fm} be a basis of the Riemann-Roch space L(D). By the Riemann-Roch

The-orem we have that m > deg(D) + 1 − gY, where gYis the genus ofY.

From now on, we assume that m = deg(D) + 1 − gY, where deg(D) = t`, and we consider the K-subspace V of K(X) of dimension rm generated by

(5)

generalized hamming weights of ag lrc codes 4

We consider the evaluation map evA : V → K(r+1)s. Then we have the following

theo-rem.

Theorem 1. The linear space C(D, g) = SpanK(r+1)shevA(B)i is an (n, k, r) algebraic

geomet-ric LRC code with parameters

n = (r + 1)s

k = rm> r(t` + 1 − gY) d > n − t`(r + 1) − (r − 1)h. Proof. See Theorem 3.1 of [1].

The AG LRC codes have an additional property. They are LRC codes (n, k, r) with (r + 1)| n and r | k. The set {1, . . . , n} can be divided into n/(r + 1) disjoint subsets Uj for 1 6 j 6 s with the same cardinality r + 1. For each i the set Ii ⊆ {1, . . . , n} \ {i} is the complement of i in the element of the partition Ujcontaining j, i.e. for all i, j ∈{1, . . . , n}

either Ii= Ij or Ii∩ Ij =∅.

Moreover, they have also the following nice property. Fix w ∈ (K)n and denote by wUj ={wι, for any ι ∈ Uj}. Suppose we receive all the symbols in Uj. There is a simple

linear parity test on the r + 1 symbols of Uj such that if this parity check fails we know

that at least one of the symbols in Uj is wrong. If we are guaranteed (or we assume)

that at most one of the symbols in Uj is wrong and the parity check is OK, then all the

symbols in Uj are correct. Moreover we can recover an erased symbol wι, with ι ∈ Uj

using a polynomial interpolation through the points of the recovering set wUj.

3

generalized hamming weights of ag lrc codes

Let K be a field and letX be a smooth and geometrically connected curve of genus g > 2 defined over the field K. We also assumeX(K) 6= ∅. We recall the following definitions:

Definition 3([29], [30]). The K-gonality γK(X) of X over a field K is the smallest possible

degree of a dominant rational mapX → P1

K. For any field extension L of K, we define

also the L-gonality γL(X) of X as the gonality of the base extension XL = X ×KL. It is

an invariant of the function field L(X) of XL.

Moreover, for each integer i > 0, the i-th gonality γi,L(X) of X is the minimal degree z

such that there is R ∈ Picz(X)(L) with h0(R)> i + 1. The sequence γ

i,K(X) is the usual

gonality sequence [20]. Moreover, the integer γ1,K(X) = γK(X) is the K-gonality of X.

Let K = Fq a finite field with q elements. Let C ⊂ Kn be a linear [n, k] code over K.

We recall that the support of C is defined as follows

supp(C) ={i | ci6= 0 for some c ∈ C}.

So ]supp(C) is the number of nonzero columns in a generator matrix for C. Moreover, for any 1 6 v 6 k, the v-th generalized Hamming weight of C [14, §7.10], [36, §1.1] is

defined by

(6)

lrc codes from norm–trace curve 5

In other words, for any integer 1 6 v 6 k, dv(C) is the v-th minimum support weights,

i.e. the minimal integer t such that there are an [n, v] subcode D of C and a subset S⊂ {1, . . . , n} such that ](S) = t and each codeword of D has zero coordinates outside S. The sequence d1(C), . . . , dk(C) of generalized Hamming weights (also called weight

hierarchy of C) is strictly increasing (see Theorem 7.10.1 of [14]). Note that d1(C) is the

minimum distance of the code C.

Let us consider X and Y smooth projective absolutely irreducible curves over K and let g : X → Y be a rational separable map of curves of degree r + 1. Moreover we take r, t, Q, f1, . . . , fm andA = g−1(S)defined as Section 2.2. So we can construct an

(n, k, r) algebraic geometric LRC code C as in Theorem 1. For this code we have the

following:

Theorem 2. Let C be an (n, k, r) algebraic geometric LRC code as in Theorem 1. For every integer v > 2 we have that

dv(C)> n − t`(r + 1) − (r − 1)h + γv−1,K(X).

Proof. Take a v-dimensional linear subspaceD of C and call E⊆{Pij| i = 0, . . . r, j = 1, . . . , s},

the set of common zeros of all elements of D. Since n − dv(C) = ](E), we have to

prove that t`(r + 1) + (r − 1)h − ](E) > γv−1,K(X). Fix u ∈ D \ {0} and let Fu denote

the zeros of u. Note that Fu is contained in the set {Pij | i = 0, . . . r, j = 1, . . . , s} by

the definition of the code C. We have Fu ⊇ E. By the definition of the integers t, ` and

h :=deg(x), we have ](Fu)6 t`(r + 1) + (r − 1)h. The divisors Fu− E, u ∈D \ {0} form a

family of linearly equivalent non-negative divisors, each of them defined over K. Since dim(D) = v, the definition of γv−1,K(X) gives ](Fu) −](E) > γv−1,K(X). This inequality for a single u ∈D \ {0} proves the theorem.

See Remark1for an application of Theorem2.

4

lrc codes from norm–trace curve

In this section we propose a new family of Algebraic Geometric LRC codes, that is, a LRC codes from the Norm–Trace curve. Moreover, we compute theFqu-gonality of the

Norm-Trace curve.

Let K = Fqu be a finite field, where q is a power of a prime. We consider the norm

NFquFq and the trace TrFquFq , two functions from Fqu toFqdefined as

NFquFq (x) = x1+q+···+qu−1 and TrFquFq (x) = x + xq+· · · + xqu−1.

The Norm-Trace curve χ is the curve defined over K by the following affine equation NFquFq (x) =TrFquFq (y),

(7)

lrc codes from norm–trace curve 6

that is,

x(qu−1)/(q−1)= yqu−1+ yqu−2+ . . . + ywhere x, y ∈ K (1) The Norm-Trace curve χ has exactly n = q2u−1K-rational affine points (see Appendix A

of [5]), that we denote byPχ={P1, . . . , Pn}. The genus of χ is g = 1

2(q

u−1− 1)(qu−1

q−1 − 1).

Note that if we consider u = 2, we obtain the Hermitian curve.

Starting from the Norm–Trace curve, we have two different ways to construct Norm– Trace LRC codes.

projection on x We have to construct a qu-ary (n, k, r) LRC codes. We consider

the natural projection g(x, y) = x. Then the degree of g is qu−1 = r + 1 and the

degree of y is h = 1 + q + · · · + qu−1.

To construct the codes we consider S = Fqu and D = tQfor some t > 1. Then, using

a construction of Theorem1we find the parameters for these Norm–Trace LRC codes.

Proposition 1. A family of Norm–Trace LRC codes has the following parameters:

n = q2u−1, k = mr = (t + 1)(qu−1− 1) and

d> n − tqu−1 − (qu−1 − 1)(1 + q +· · · + qu−1).

projection on y We have to construct a qu-ary (n, k, r) LRC codes. We consider

the other natural projection g0(x, y) = y. Then deg(g0) = 1 + q +· · · + qu−1 = r + 1.

In this case we take S =Fqu\M, where

M = {a ∈ Fqu | aq u−1

+ aqu−2+ . . . + a = 0},

so r = q + · · · + qu−1 and h = deg(x) = qu−1. Then, using Theorem1we have the

following

Proposition 2. A family of Norm–Trace LRC codes has the following parameters:

n = q2u−1− qu−1, k = mr = (t + 1)(q +· · · + qu−1)

and

d> n − tqu−1− (q +· · · + qu−1) − qu−1(qu−1+· · · + q − 1).

For the Norm–Trace curve χ we are able to find the K-gonality of χ.

Lemma 1. Let χ be a Norm–Trace curve defined overFqu, where u > 2. We have γ1,Fqu(χ) =

qu−1.

Proof. The linear projection onto the x axis has degree qu−1 and it is defined over Fq

and hence over Fqu. Thus γ1,Fqu(χ) 6 qu−1. Denote by z = γ1,Fqu(χ) and assume

that z 6 qu−1− 1. By the definition of K-gonality, there is a non-constant morphism

w : χ→P1with deg(w) = z and defined overF

qu. Since w(χ(Fqu))⊆P1(Fqu), we get

(8)

hermitian lrc codes 7

Remark 1. By Lemma1, we can apply Theorem 2to the Norm–Trace curve. In fact, we

can consider the gonality sequence over K of χ to get a lower bound on the second generalized Hamming weight of the two families of Norm–Trace LRC codes:

Let t > 1 and let C be a (q2u−1, (t + 1)(qu−1− 1), qu−1− 1) Norm–Trace LRC

code. Then we have

d2(C)> q2u−1+ qu−1− tqu−1− (qu−1− 1)(1 + q +· · · + qu−1).

Let t > 1 and let C be a Norm–Trace LRC code with parameters (q2u−1− qu−1,

(t + 1)(q +· · · + qu−1), q + · · · + qu−1). Then we have

d2(C)> q2u−1− (t − 1)qu−1− (1 + qu−1)(q +· · · + qu−1).

5

hermitian lrc codes

In this section we improve the bound on the distance of Hermitian LRC codes proposed in [1] using some properties of Hermitian codes which are a special case of algebraic

geometric codes.

5.1 Hermitian codes

Let us consider K =Fq2 a finite field with q2 elements. The Hermitian curveH is defined

over K by the affine equation

xq+1= yq+ y where x, y ∈ K. (2) This curve has genus g = q(q−1)2 and has q3+ 1 points of degree one, namely a pole Q and n = q3 rational affine points, denoted byPH={P1, . . . , Pn} [31].

Definition 4. Let m ∈N such that 0 6 m 6 q3+ q2− q − 2. Then the Hermitian code

C(m, q) is the code C(D, mQ∞)where

D = X

αq+1q

Pα,β

is the sum of all places of degree one (except Q∞, that is a point at infinity) of the Hermitian function field K(H).

By Lemma 6.4.4. of [33] we have that

Bm,q ={xiyj | qi + (q + 1)j 6 m, 0 6 i 6 q2− 1, 0 6 j 6 q − 1},

forms a basis ofL(mQ∞). For this reason, the Hermitian code C(m, q) could be seen as SpanFq2hevPH(Bm,q)i. Moreover, the dual of C(m, q) denoted by C(m⊥, q) = C⊥(m, q)

is again an Hermitian code and it is well known (Proposition 8.3.2 of [33]) that the

degree m of the divisor has the following relation with respect to m⊥:

(9)

hermitian lrc codes 8

The Hermitian codes can be divided in four phases [11], any of them having specific

explicit formulas linking their dimension and their distance [22]. In particular we are

interested in the first and the last phase of Hermitian codes, which are:

i phase: 0 6 m⊥ 6 q2− 2 . Then we have m⊥ = aq + b where 0 6 b 6 a 6 q − 1

and b 6= q − 1. In this case, the distance is

d = a + 1 if a > b

d = a + 2 if a = b. (4)

iv phase: n − 1 6 m⊥ 6 n + 2g − 2 . In this case m⊥ = n + 2g − 2 − aq − bwhere

a, b are integers such that 0 6 b 6 a 6 q − 2 and the distance is

d = n − aq − b. (5)

5.2 Bound on distance of Hermitian LRC codes

Let K = Fq2 be a finite field, where q is a power of a prime. Let X = H be the

Hermitian curve with affine equation as in (2). We recall that this curve has q3 F

q2

-rational affine points plus one at infinity, that we denoted by Q.

We consider two of the three constructions of Hermitian LRC codes proposed in [1]

and we improve the bound on distance of Hermitian LRC codes using properties of Hermitian codes. In particular, if we find an Hermitian code C(m, q) = CHer such

that CLRC ⊂ CHer, then we have dLRC > dHer.

projection on x By Proposition 4 of [1], we have a family of (n, k, r) Hermitian

LRC codes with r = q − 1, length n = q3, dimension k = (t − 1)(q − 1) and distance

d > n − tq − (q − 2)(q + 1). Moreover, for these codes, S = K, D = tQ for some 1 6 t 6 q2 − 1and the basis for the vector space V is

B = {xjyi | j = 0, . . . , t, i = 0, . . . , q − 2}.

(6) Using the Hermitian codes, we improve the bound on the distance for any integer t, such that q2− q + 1 6 t 6 q2 − 1.

To find an Hermitian code C(m, q) = CHer such that CLRC ⊂ CHer, we have to

compute the setBm,q, that is, we have to find m. After that, to compute the distance of

C(m, q) we use (4) and (5).

We consider the first Hermitian phase: 0 6 m⊥ 6 q2 − 2, that is, q2 − q + 1 6 t 6

q2− 1.

For this phase m⊥ = aq + b, where 0 6 b 6 a 6 q − 1 and the distance of the

Hermitian code is either d = a + 1 if a > b or d = a + 2 if a = b. By (6), m must be

equal to m = qt + (q + 1)(q − 2) and by (3) we have that m = n + 2g − 2 − m =

q(q2 − t). So b = 0 and a = q2 − t and the distance of the Hermitian code is dHer = a + 1 = q2 − t + 1, since a > b. This implies that

(10)

references 9

Note that (7) improves the bound on the distance proposed in Proposition 4 of [1] since q2− t + 1 > q3− tq − (q − 2)(q + 1) ⇐⇒ t(q − 1) > q(q − 1)2+ 1 ⇐⇒ t > q2− q.

We just proved the following:

Proposition 3. Let q2− q + 1 6 t 6 q2− 1. It is possible to construct a family of (n, k, r) Hermitian LRC codes{Ct}q2−q+16t6q2−1 with the following parameters:

n = q3, k = (t − 1)(q − 1), r = q − 1 and d > q2− t + 1.

two recovering sets In [1] the authors propose an Hermitian code with two

recov-ering sets of size r1= q − 1and r2 = q, denoted by LRC(2). They consider

L = Span{xiyj, i = 0, . . . , q − 2, j = 0, . . . , q − 1}

and a linear code C obtained by evaluating the functions in L at the points of B = g−1(Fq2\M), where g(x, y) = x and M = {a ∈ Fq | aq+ a = 0}. So |B| = q3− q. By

Proposition 4.3 of [1], the LRC(2) code has length n = (q2− 1)q, dimension k = (q − 1)q

and distance

d> (q + 1)(q2− 3q + 3) = q3− 2q2+ 3. (8) As before, we improve the bound on the distance using Hermitian codes that contains the LRC(2) code. To do this we have to find m⊥. By L, we have that m = q(q −

1) + (q + 1)(q − 2) so we are in the fourth phase of Hermitian codes because m⊥ =

n + 2g − 2 − m = q3− q2+ q. In this case dHer = m⊥− 2g + 2 = q3+ 2q + 2. Since

|B| = q3− q, we have that

dLRC> dHer− q = q3+ q + 2. (9) Note that this bound improves bound (8). We just proved the following proposition:

Proposition 4. Let C be a linear code obtained by evaluating the functions in L at the points of

B. Then C has the following parameters:

n = (q2− 1)q, k = (q − 1)q, r1= q − 1, r2 = qand d > q3+ q + 2.

acknowledgements

The authors would like to thank the anonymous referees for their comments.

references

[1] A. Barg, I. Tamo, and S. Vl˘adut. Locally recoverable codes on algebraic curves. arXiv preprint arXiv:1501.04904, 2015.

[2] H. Chen, R. Cramer, S. Goldwasser, R. De Haan, and V. Vaikuntanathan. Se-cure computation from random error correcting codes. In Advances in Cryptology-EUROCRYPT 2007, pages 291–310. Springer, 2007.

(11)

references 10

[3] M. Forbes and S. Yekhanin. On the locality of codeword symbols in non-linear codes. Discrete Mathematics, 324:78–84, 2014.

[4] G. D. Forney. Dimension/length profiles and trellis complexity of linear block codes. Information Theory, IEEE Transactions on, 40(6):1741–1752, 1994.

[5] O. Geil. On codes from Norm-Trace curves. Finite Fields Appl., 9:351–371, 2003. [6] O. Geil, S. Martin, R. Matsumoto, D. Ruano, and Y. Luo. Relative generalized

Hamming weights of one-point algebraic geometric codes. Information Theory, IEEE Transactions on, 60(10):5938–5949, 2014.

[7] P. Gopalan, V. Guruswami, and P. Raghavendra. List decoding tensor products and interleaved codes. SIAM Journal on Computing, 40(5):1432–1462, 2011.

[8] P. Gopalan, C. Huang, H. Simitci, and S. Yekhanin. On the locality of codeword symbols. Information Theory, IEEE Transactions on, 58(11):6925–6934, 2012.

[9] V. Guruswami. List decoding from erasures: Bounds and code constructions. Infor-mation Theory, IEEE Transactions on, 49(11):2826–2833, 2003.

[10] P. Heijnen and R. Pellikaan. Generalized Hamming weights of q-ary Reed-Muller codes. In IEEE Trans. Inform. Theory. Citeseer, 1998.

[11] T. Høholdt, J. H. van Lint, and R. Pellikaan. Algebraic geometry of codes. In V. S. Pless and W. Huffman, editors, Handbook of coding theory, Vol. I, II, pages 871–961. North-Holland, 1998.

[12] M. Homma and S. J. Kim. The second generalized hamming weight for two-point codes on a Hermitian curve. Designs, Codes and Cryptography, 50(1):1–40, 2009. [13] C. Huang, M. Chen, and J. Li. Pyramid codes: Flexible schemes to trade space

for access efficiency in reliable data storage systems. ACM Transactions on Storage (TOS), 9(1):3, 2013.

[14] W. C. Huffman and V. Pless. Fundamentals of error-correcting codes. Cambridge university press, 2003.

[15] H. Janwa and A. K. Lal. On generalized Hamming weights and the covering radius of linear codes. In Applied algebra, algebraic algorithms and error-correcting codes, pages 347–356. Springer, 2007.

[16] T. Kasami, T. Takata, T. Fujiwara, and S. Lin. On complexity of trellis structure of linear block codes. Information Theory, IEEE Transactions on, 39(3):1057–1064, 1993. [17] T. Kasami, T. Takata, T. Fujiwara, and S. Lin. On the optimum bit orders with

re-spect to the state complexity of trellis diagrams for binary linear codes. Information Theory, IEEE Transactions on, 39(1):242–245, 1993.

(12)

references 11

[18] J. Kurihara and T. Uyematsu. Strongly-secure secret sharing based on linear codes can be characterized by generalized Hamming weight. In Communication, Control, and Computing (Allerton), 2011 49th Annual Allerton Conference on, pages 951–957. IEEE, 2011.

[19] J. Kurihara, T. Uyematsu, and R. Matsumoto. Secret sharing schemes based on linear codes can be precisely characterized by the relative generalized hamming weight. IEICE Transactions on Fundamentals of Electronics, Comications and Computer Sciences, 95(11):2067–2075, 2012.

[20] H. Lange and G. Martens. On the gonality sequence of an algebraic curve. Manuscripta mathematica, 137(3-4):457–473, 2012.

[21] Y. Luo, C. Mitrpant, A. J. H. Vinck, and K. Chen. Some new characters on the wire-tap channel of type II. Information Theory, IEEE Transactions on, 51(3):1222–1229, 2005.

[22] C. Marcolla. On structure and decoding of Hermitian codes. PhD thesis, University of Trento, 2013.

[23] S. Martin and O. Geil. Relative generalized Hamming weights of q-ary Reed-Muller codes. arXiv preprint arXiv:1407.6185, 2014.

[24] C. Munuera. On the generalized Hamming weights of geometric Goppa codes. IEEE transactions on information theory, 40(6):2092–2099, 1994.

[25] C. Munuera and D. Ramirez. The second and third generalized Hamming weights of Hermitian codes. Information Theory, IEEE Transactions on, 45(2):709–712, 1999. [26] C.-K. Ngai, R. W. Yeung, and Z. Zhang. Network generalized hamming weight.

Information Theory, IEEE Transactions on, 57(2):1136–1143, 2011.

[27] W. Olaya-León and C. Granados-Pinzón. The second generalized hamming weight of certain Castle codes. Designs, Codes and Cryptography, 76(1):81–87, 2015.

[28] D. S. Papailiopoulos and A. G. Dimakis. Locally repairable codes. Information Theory, IEEE Transactions on, 60(10):5843–5855, 2014.

[29] R. Pellikaan. On the gonality of curves, abundant codes and decoding. In Coding theory and algebraic geometry, pages 132–144. Springer, 1992.

[30] B. Poonen. Gonality of modular curves in characteristic p. Mathematical Research Letters, 14(4):691–701, 2007.

[31] H. G. Ruck and H. Stichtenoth. A characterization of Hermitian function fields over finite fields. Journal fur die Reine und Angewandte Mathematik, 457:185–188, 1994. [32] N. Silberstein, A. S. Rawat, O. O. Koyluoglu, and S. Vishwanath. Optimal locally

repairable codes via rank-metric codes. In Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, pages 1819–1823. IEEE, 2013.

(13)

references 12

[33] H. Stichtenoth. Algebraic function fields and codes. Universitext. Springer-Verlag, Berlin, 1993.

[34] I. Tamo and A. Barg. A family of optimal locally recoverable codes. Information Theory, IEEE Transactions on, 60(8):4661–4676, 2014.

[35] I. Tamo, D. S. Papailiopoulos, and A. G. Dimakis. Optimal locally repairable codes and connections to matroid theory. In Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, pages 1814–1818. IEEE, 2013.

[36] M. Tsfasman, S. Vl˘adut, and D. Nogin. Algebraic geometric codes: basic notions, vol-ume 139. American Mathematical Soc., 1990.

[37] V. K. Wei. Generalized Hamming weights for linear codes. Information Theory, IEEE Transactions on, 37(5):1412–1418, 1991.

[38] K. Yang, P. V. Kumar, and H. Stichtenoth. On the weight hierarchy of geometric Goppa codes. Information Theory, IEEE Transactions on, 40(3):913–920, 1994.

Riferimenti

Documenti correlati

This study investigated the effects of extracurricular multilateral training (MT) la- sting for 12 weeks compared to a standard training (ST) program performed at school as required

I danni non gravi di un fs ext2/ext3 (inode non referenziati, blocchi di dati indicati come liberi ma usati in un file, informazioni di superblock sbagliate, ecc…) possono

Come emerso dalla ricerca, la scrittura autobiografica occupa un ruolo importante, questo perché la persona ha la possibilità di auto-comprendersi, comprendere l’altro e

E’ stato recentemente pubblicato uno studio di Fase II dove la capecitabina metronomica è stata utilizzata nel trattamento dell’HCC sia in prima che in seconda

Il Procuratore Nazionale Anti-Mafia, Franco Roberti, ha spiegato, nella sua lectio magistralis presso l'Università di Salerno, come il problema della repressione del crimine

La tradizione anglosassone aveva studiato la pratica della ginnastica nella sua applicazione concreta soprattutto negli sport all’aria aperta e in particolare nel Rugby, Per Arnold,

Moreover the Maximum Available Gain (MAG) of the amplifier has been evaluated in the range 12 – 20GHz where the circuit is unconditionally stable. Fig.6 shows the comparison

Muon events are triggered by the ASTRI camera during the regular science data taking under the same topological trigger configuration used for gamma and protons (5